Follow
PADMAVATHY R
PADMAVATHY R
Assistant profeaaor
Verified email at nitw.ac.in
Title
Cited by
Cited by
Year
Anion assisted supramolecular self-assemblies of succinate and malate adducts: crystal structures and theoretical modelling
R Padmavathy, N Karthikeyan, D Sathya, R Jagan, RM Kumar, ...
RSC advances 6 (72), 68468-68484, 2016
162016
An improved fast and secure hash algorithm
S Agarwal, A Rungta, R Padmavathy, M Shankar, N Rajan
Journal of Information Processing Systems 8 (1), 119-132, 2012
152012
Discrete logarithm problem using index calculus method
R Padmavathy, C Bhagvati
Mathematical and computer modelling 55 (1-2), 161-169, 2012
122012
Methods to solve discrete logarithm problem for ephemeral keys
R Padmavathy, C Bhagvati
2009 International Conference on Advances in Recent Technologies in …, 2009
82009
Improved three party EKE protocol
R Padmavathy
Information Technology and control 39 (3), 2010
62010
Crystal structure, DFT study, hirshfeld surface and PIXEL energy calculations of benzimidazolium and hexadecylaminium hydrogen maleate salts
R Padmavathy, N Karthikeyan, D Sathya, R Jagan, RM Kumar, ...
Journal of Molecular Structure 1136, 144-156, 2017
52017
A Small Subgroup Attack for Recovering Ephemeral Keys in Chang and Chang Password Key Exchange Protocol.
R Padmavathy, C Bhagvati
J. Comput. 6 (4), 805-811, 2011
52011
A Key Recovery Attack on Chang-Chang Password Key Exchange Protocol
R Padmavathy, C Bhagvati
Computer And Network Technology, 176-181, 2010
52010
Cryptanalysis on a Three Party Key Exchange Protocol-STPKE'
S Tallapally, R Padmavathy
Journal of Information processing systems 6 (1), 43-52, 2010
42010
Improved analysis on Chang and Chang Password Key Exchange Protocol
R Padmavathy, T Shirisha, M Rajkumar, J Gyani
2009 International Conference on Advances in Computing, Control, and …, 2009
42009
An authenticated keyword searchable conditional proxy re-encryption scheme in cloud services
A Swarnakar, CJ Babu, R Padmavathy, R Kumar
2020 5th International Conference on Computing, Communication and Security …, 2020
32020
Reversible data hiding using prior pixel pairs in two-dimensional histogram with tri-directional modification of difference histogram
A Pinapati, R Padmavathy
IETE Technical Review, 2018
32018
N—H⋯ O, O—H⋯ O hydrogen-bonded supramolecular sheet formation in the bis (2-aminoanilinium) fumarate, 3-methylanilinium hydrogen fumarate and 4-chloroanilinium hydrogen …
D Sathya, R Jagan, R Padmavathy, RM Kumar, K Sivakumar
Acta Crystallographica Section C: Crystal Structure Communications 69 (8 …, 2013
32013
Block Lanczos to Solve Integer Factorization Problem Using GPU’s
H Malla, V SantKaustubh, R Ganesh
Advances in Computer Science and Information Technology. Networks and …, 2012
32012
Ephemeral key recovery using index calculus method
R Padmavathy, C Bhagvati
Journal of Discrete Mathematical Sciences and Cryptography 13 (1), 29-43, 2010
32010
A New Method for Computing DLP Based on Extending Smooth Numbers to Finite Field for Ephemeral Key Recovery.
R Padmavathy, C Bhagvati
Int. J. Netw. Secur. 17 (3), 243-254, 2015
22015
Index Calculus Method based on Smooth Numbers of±1 over Zp.
R Padmavathy, C Bhagvati
Int. J. Netw. Secur. 15 (4), 265-273, 2013
22013
Quantum-Secure N2N Authentication Protocol Model for IoT Sensor Networks
C Jayanth Babu, R Padmavathy
Arabian Journal for Science and Engineering, 1-12, 2023
12023
Secured Cloud Communication Using Lightweight Hash Authentication with PUF.
R Padmavathy, MN Rajkumar
Computer Systems Science & Engineering 43 (1), 2022
12022
Linear algebra on parallel structures using wiedemann algorithm to solve discrete logarithm problem
KS Spoorthi, R Padmavathy, SK Pal, S Ravi Chandra
IETE Journal of Research 68 (4), 2376-2389, 2022
12022
The system can't perform the operation now. Try again later.
Articles 1–20